Some (hacky) fast SSH-Scanner to try some credential at ✨ webscale ✨ against a lot (or maybe even all IPv4) SSH servers.
As a preparation masscan
the target network for open SSH servers, write a text file, one target IP per line.
Usage of ./ssh-scanner:
-cpuprofile string
write cpu profile to file
-input string
Text file with ip addresses (default "in.txt")
-logfile string
Logfile (default "log.jsonl")
-p int
Parallelism, must be smaller than: net.ipv4.ip_local_port_range (second value - first value) (default 40000)
-pass string
SSH password
-src string
Comma separated list of source IP addresses to use
-user string
SSH user
- Tuning TCP kernel parameters yields better, faster results
- You'll get a bunch of abuse complaints, much more than from a
masscan
-> talk to you ISP or be your ISP - Code quality could be improved, this was a quick hack to determine impact of some hardcoded credentials in some internet of shit device
- More features could be added, e.g. writing results to an Elasticsearch or database
-p
means parallelism and not 'port', I am sorry and noticed only while writing this README :p